Certification: GAWN

GIAC Assessing and Auditing Wireless Networks (GAWN)

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

The candidate will be familiar with weak encryption methods including WEP and how to attack and secure them.

Bluetooth Attacks

The candidate will be familiar with the structure, uses and weaknesses of Bluetooth.

Bluetooth Low Energy Attacks

The candidate will demonstrate understanding of how changes to Bluetooth Low Energy affect security, and methods to test, inspect, and audit Bluetooth Low Energy data in transit.

Bridging the Air Gap

The candidate will be able to use a compromised wireless system to further compromise a wired network.

DECT

The candidate will be familiar with DECT including how to attack and secure it.

DoS on Wireless Networks

The candidate will be able to perform and defend against common DoS attacks.

High-Frequency RFID Attacks

The candidate will demonstrate understanding of RFID tracking techniques, and how to exploit mid to long-range RFID applications.

Hotspots

The candidate will be familiar with the identification and auditing of hotspots.

Low-Frequency RFID Attacks

The candidate will demonstrate understanding of short-range, Low Frequency (LF) RFID attacks, including impersonation and cloning of Low-Frequency RFID tags.

NFC

The candidate will demonstrate understanding of Near Field Communications (NFC) and how it uses consistent data protocols to exchange data bidirectionally for uses in payment systems, and generic data transfers.

Practical SDR Attacks

The candidate will be familiar with the common implementations of wireless protocols and how SDR projects can identify failures in the overall implementation of those protocols.

Rogue Networks

The candidate will understand how to identify and protect against rogue networks.

Sniffing Wireless

The candidate will be capable of capturing wireless traffic.

Wireless Basics

The candidate will be familiar with common wireless threats as well as current wireless network standards.

Wireless Client Attacks

The candidate will demonstrate understanding of wireless client vulnerabilities, including hotspot injection, weaknesses in wireless client segmentation or public secure packet forwarding, and the preferred network list on client systems.

WPA2

The candidate will be familiar with WPA2 including how to attack and secure it.

Zigbee

The candidate will be familiar with Zigbee including how to attack and secure it.